QUESTION 31Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

QUESTION 32Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment.Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment.You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com.Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted user domain.Does this meet the goal?

A. YesB. No

Answer: BExplanation:Contoso would need to be the Trusted User Domain.

QUESTION 33Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

The relevant users and client computer in the domain are configured as shown in the following table.

End of repeated scenario.

You are evaluating what will occur when you block inheritance on OU4. Which GPO or GPOs will apply to User1 when the user signs in to Computer1 after block inheritance is configured?

A. A1, A5, and A6B. A3, A1, A5, and A7C. A3 and A7 onlyD. A7 only

Answer: D

QUESTION 34Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment.Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment.You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com.Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted publisher domain.Does this meet the goal?

A. YesB. No

Answer: A

QUESTION 35Your network contains an Active Directory domain named contoso.com.You have a Group Policy object (GPO) named GPO1. GPO1 is linked to an organizational unit (OU) named OU1.GPO1 contains several corporate desktop restrictions that apply to all computers.You plan to deploy a printer to the computers in OU1.You need to ensure that any user who signs in to a computer that runs Windows 10 in OU1 receives the new printer. All of the computers in OU1 must continue to apply the corporate desktop restrictions from GPO1.What should you configure?

A. a user preference and a WMI filter on GPO1.B. a computer preference that uses item-level targetingC. a computer preference and WMI filter on GPO1D. a user preference that uses item-level targeting

Answer: D

QUESTION 36Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The computer account for Server1 is in organizational unit (OU) named OU1.You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.You need to add a domain user named User1 to the local Administrators group on Server1.Solution: From the Computer Configuration node of GPO1, you configure the Account Policies settings.Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 37Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com.You need to limit the number of Active Directory Domain Services (AD DS) objects that a user can create in the domain.Which tool should you use?

QUESTION 38Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1.You recently restored a backup of the Active Directory database from Server1 to an alternate Location.The restore operation does not interrupt the Active Directory services on Server1.You need to make the Active Directory data in the backup accessible by using Lightweight Directory Access Protocol (LDAP).Which tool should you use?

QUESTION 39Your network contains an Active Directory forest. The forest contains two domains named litwarenc.com and contoso.com. The contoso.com domain contains two domains controllers named LON-DC01 and LON-DC02. The domain controllers are located in a site named London that is associated to a subnet of 192.168.10.0/24You discover that LON-DC02 is not a global catalog server.You need to configure LON-DC02 as a global catalog server.What should you do?

A. From Active Directory Sites and Services, modify the properties of the 192.168.10.0/24 IP subnet.B. From Windows PowerShell, run the Set-NetNatGlobal cmdlet.C. From Active Directory Sites and Services, modify the NTDS Settings object of LON- DC02.D. From Windows PowerShell, run the Enable-ADOptionalFeature cmdlet.

Answer: C

QUESTION 40Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

The relevant users and client computer in the domain are configured as shown in the following table.

End of repeated scenario.

You are evaluating what will occur when you disable the Group Policy link for A6. Which GPOs will apply to User2 when the user signs in to Computer1 after the link for A6 is disabled?